[or-cvs] r10473: Bind ports before setuid/setgid. (in tor/trunk: . doc src/or)

nickm at seul.org nickm at seul.org
Sun Jun 3 23:00:27 UTC 2007


Author: nickm
Date: 2007-06-03 19:00:26 -0400 (Sun, 03 Jun 2007)
New Revision: 10473

Modified:
   tor/trunk/
   tor/trunk/ChangeLog
   tor/trunk/doc/TODO
   tor/trunk/src/or/config.c
Log:
 r13186 at catbus:  nickm | 2007-06-03 19:00:20 -0400
 Bind ports before setuid/setgid.



Property changes on: tor/trunk
___________________________________________________________________
 svk:merge ticket from /tor/trunk [r13186] on 8246c3cf-6607-4228-993b-4d95d33730f1

Modified: tor/trunk/ChangeLog
===================================================================
--- tor/trunk/ChangeLog	2007-06-03 22:14:38 UTC (rev 10472)
+++ tor/trunk/ChangeLog	2007-06-03 23:00:26 UTC (rev 10473)
@@ -1,5 +1,10 @@
 Changes in version 0.2.0.3-alpha - 2007-??-??
-  o Minor bugfixes ():
+  o Minor features:
+    - Create listener connections before we setuid to the configured User and
+      Group.  This way, you can choose port values under 1024, start Tor as
+      root, and have Tor bind those ports before it changes to another UID.
+
+  o Minor bugfixes (dns):
     - Fix a crash when DNSPort is set more than once. (Patch from Robert
       Hogan.)
 

Modified: tor/trunk/doc/TODO
===================================================================
--- tor/trunk/doc/TODO	2007-06-03 22:14:38 UTC (rev 10472)
+++ tor/trunk/doc/TODO	2007-06-03 23:00:26 UTC (rev 10473)
@@ -246,7 +246,7 @@
         - Teach exit policies about ipv6 (consider ipv4/ipv6 interaction!)
         - ...
     - Let servers decide to support BEGIN_DIR but not DirPort.
-    - Tor should bind its ports before dropping privs, so users don't
+    o Tor should bind its ports before dropping privs, so users don't
       have to do the ipchains dance.
     - Blocking-resistance.
     - It would be potentially helpful to https requests on the OR port by

Modified: tor/trunk/src/or/config.c
===================================================================
--- tor/trunk/src/or/config.c	2007-06-03 22:14:38 UTC (rev 10472)
+++ tor/trunk/src/or/config.c	2007-06-03 23:00:26 UTC (rev 10473)
@@ -804,11 +804,36 @@
   int r = -1;
   int logs_marked = 0;
 
+  /* Daemonize _first_, since we only want to open most of this stuff in
+   * the subprocess. */
   if (running_tor && options->RunAsDaemon) {
     /* No need to roll back, since you can't change the value. */
     start_daemon();
   }
 
+  /* We need to set the connection limit before we can open the listeners. */
+  options->_ConnLimit =
+    set_max_file_descriptors((unsigned)options->ConnLimit, MAXCONNECTIONS);
+  if (options->_ConnLimit < 0) {
+    *msg = tor_strdup("Problem with ConnLimit value. See logs for details.");
+    goto rollback;
+  }
+  set_conn_limit = 1;
+
+  /* Set up libevent.  (We need to do this before we can register the
+   * listeners as listeners.) */
+  if (running_tor && !libevent_initialized) {
+    init_libevent();
+    libevent_initialized = 1;
+  }
+
+  /* Launch the listeners.  (We do this before we setuid, so we can bind to
+   * ports under 1024.) */
+  if (retry_all_listeners(0, replaced_listeners, new_listeners) < 0) {
+    *msg = tor_strdup("Failed to bind one of the listener ports.");
+    goto rollback;
+  }
+
   /* Setuid/setgid as appropriate */
   if (options->User || options->Group) {
     if (switch_id(options->User, options->Group) != 0) {
@@ -819,12 +844,6 @@
     }
   }
 
-  /* Set up libevent. */
-  if (running_tor && !libevent_initialized) {
-    init_libevent();
-    libevent_initialized = 1;
-  }
-
   /* Ensure data directory is private; create if possible. */
   if (check_private_dir(options->DataDirectory, CPD_CREATE)<0) {
     char buf[1024];
@@ -841,19 +860,6 @@
   if (options->command != CMD_RUN_TOR)
     goto commit;
 
-  options->_ConnLimit =
-    set_max_file_descriptors((unsigned)options->ConnLimit, MAXCONNECTIONS);
-  if (options->_ConnLimit < 0) {
-    *msg = tor_strdup("Problem with ConnLimit value. See logs for details.");
-    goto rollback;
-  }
-  set_conn_limit = 1;
-
-  if (retry_all_listeners(0, replaced_listeners, new_listeners) < 0) {
-    *msg = tor_strdup("Failed to bind one of the listener ports.");
-    goto rollback;
-  }
-
   mark_logs_temp(); /* Close current logs once new logs are open. */
   logs_marked = 1;
   if (options_init_logs(options, 0)<0) { /* Configure the log(s) */



More information about the tor-commits mailing list